Security and Privacy of data in Cloud Audit using the key based Cryptography Technique Schemes

Authors

  • Sunitha K M Professor, Department of Computer Science, Vijaya College, R V Road, Basavanagudi, Bangalore -560084 & Research Scholar Kalinga University.

Abstract

Through the advent of the biosphere Extensive Net and the consequently the appearance of ecommerce requests and public schemes, managements crosswise the biosphere engender an massive quantity of information day-to-day. Material sanctuary is that the maximum life-threatening rudimentary subject in ensuring safe show of material done the net. Also net safety questions are now attractive significant as civilization is touching in the direction of alphanumeric contemporary era. As extra and additional users hook up with the mesh it fascinates a lot of cyber-attacks. Its obligatory to sentinel processor and system safety i.e. the dangerous matters. The wicked bosses make a trouble within the scheme. It can operate the possessions of numerous pivots and defense the resources of its individual. throughout this broadsheet we offer an instant on System Refuge and numerous procedures done which Network Refuge in improved i.e. Steganography.

Downloads

Published

2022-03-18

How to Cite

K M, S. . (2022). Security and Privacy of data in Cloud Audit using the key based Cryptography Technique Schemes. International Journal of Current Research in Education, Culture and Society, 6(1). Retrieved from http://stm.eurekajournals.com/index.php/IJCRECS/article/view/141